Guest User

Untitled

a guest
Jul 6th, 2020
45
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 33.15 KB | None | 0 0
  1. DD-WRT Logs
  2.  
  3. Archer C9 Firmware: DD-WRT v3.0-r43055 std (05/05/20)
  4.  
  5. root@DD-WRT:~# ip a
  6. 1: lo: <LOOPBACK,MULTICAST,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1
  7. link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
  8. inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
  9. valid_lft forever preferred_lft forever
  10. inet6 ::1/128 scope host
  11. valid_lft forever preferred_lft forever
  12. 2: teql0: <NOARP> mtu 1500 qdisc noop state DOWN qlen 100
  13. link/void
  14. 3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq state UNKNOWN qlen 1000
  15. link/ether d4:6e:0e:42:8d:fc brd ff:ff:ff:ff:ff:ff
  16. inet6 fe80::d66e:eff:fe42:8dfc/64 scope link
  17. valid_lft forever preferred_lft forever
  18. 4: vlan1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br0 state UP qlen 1000
  19. link/ether d4:6e:0e:42:8d:fc brd ff:ff:ff:ff:ff:ff
  20. inet6 fe80::d66e:eff:fe42:8dfc/64 scope link
  21. valid_lft forever preferred_lft forever
  22. 5: vlan2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
  23. link/ether d4:6e:0e:42:8d:fd brd ff:ff:ff:ff:ff:ff
  24. inet 192.168.1.2/24 brd 192.168.1.255 scope global vlan2
  25. valid_lft forever preferred_lft forever
  26. inet6 fe80::d66e:eff:fe42:8dfd/64 scope link
  27. valid_lft forever preferred_lft forever
  28. 6: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq master br0 state UNKNOWN qlen 1000
  29. link/ether d4:6e:0e:42:8d:fe brd ff:ff:ff:ff:ff:ff
  30. inet6 fe80::d66e:eff:fe42:8dfe/64 scope link
  31. valid_lft forever preferred_lft forever
  32. 7: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq master br0 state UNKNOWN qlen 1000
  33. link/ether d4:6e:0e:42:8d:0a brd ff:ff:ff:ff:ff:ff
  34. inet6 fe80::d66e:eff:fe42:8d0a/64 scope link
  35. valid_lft forever preferred_lft forever
  36. 8: sit0@NONE: <NOARP> mtu 1480 qdisc noop state DOWN qlen 1
  37. link/sit 0.0.0.0 brd 0.0.0.0
  38. 9: ip6tnl0@NONE: <NOARP> mtu 1452 qdisc noop state DOWN qlen 1
  39. link/tunnel6 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 brd 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
  40. 10: br0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
  41. link/ether d4:6e:0e:42:8d:fe brd ff:ff:ff:ff:ff:ff
  42. inet 192.168.1.3/24 brd 192.168.1.255 scope global br0
  43. valid_lft forever preferred_lft forever
  44. inet6 fe80::d66e:eff:fe42:8dfe/64 scope link
  45. valid_lft forever preferred_lft forever
  46. 12: tun1: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc sfq state UNKNOWN qlen 100
  47. link/[65534]
  48. inet 10.14.0.7/16 brd 10.14.255.255 scope global tun1
  49. valid_lft forever preferred_lft forever
  50. inet6 fdda:d0d0:cafe:1300::1005/64 scope global
  51. valid_lft forever preferred_lft forever
  52.  
  53.  
  54. root@DD-WRT:~# ip route show
  55. default via 192.168.1.1 dev br0
  56. 10.14.0.0/16 dev tun1 scope link src 10.14.0.7
  57. 127.0.0.0/8 dev lo scope link
  58. 141.98.255.83 via 192.168.1.1 dev br0
  59. 174.127.113.3 via 192.168.1.1 dev br0
  60. 192.168.1.0/24 dev br0 scope link src 192.168.1.3
  61. 192.168.1.0/24 dev vlan2 scope link src 192.168.1.2
  62.  
  63. Dec 31 18:00:07 DD-WRT syslog.info syslogd started: BusyBox v1.31.1
  64. Dec 31 18:00:07 DD-WRT user.info : syslogd : daemon successfully started
  65. Dec 31 18:00:07 DD-WRT user.info : ipv6 : successfully started
  66. Dec 31 18:00:07 DD-WRT user.info : resetbutton : resetbutton daemon successfully started
  67. Dec 31 18:00:08 DD-WRT user.info : bridge : bridge br0 successfully added
  68. Dec 31 18:00:08 DD-WRT daemon.info mstpd[616]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 10
  69. Dec 31 18:00:08 DD-WRT daemon.info mstpd[616]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 10
  70. Dec 31 18:00:08 DD-WRT user.info : bridge : interface vlan1 successfully added to bridge br0
  71. Dec 31 18:00:08 DD-WRT user.info : bridge : interface eth1 successfully added to bridge br0
  72. Dec 31 18:00:14 DD-WRT user.info : bridge : interface eth2 successfully added to bridge br0
  73. Dec 31 18:00:14 DD-WRT user.info : wland : daemon successfully started
  74. Dec 31 18:00:15 DD-WRT user.info : sfe : shortcut forwarding engine successfully stopped
  75. Dec 31 18:00:15 DD-WRT daemon.info radvd[838]: version 2.18 started
  76. Dec 31 18:00:15 DD-WRT user.info : radvd : RADVD daemon successfully started
  77. Dec 31 18:00:15 DD-WRT user.info : openvpn : OpenVPN daemon (Client) starting/restarting...
  78. Dec 31 18:00:15 DD-WRT user.info : cron : daemon successfully started
  79. Dec 31 18:00:15 DD-WRT cron.info cron[866]: (CRON) STARTUP (fork ok)
  80. Dec 31 18:00:15 DD-WRT user.info : dropbear : ssh daemon successfully started
  81. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: started, version 2.81 cachesize 1500
  82. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect no-inotify no-dumpfile
  83. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq-dhcp[870]: DHCP, IP range 192.168.1.10 -- 192.168.1.59, lease time 1d
  84. Dec 31 18:00:15 DD-WRT user.info : dnsmasq : daemon successfully started
  85. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain test
  86. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain onion
  87. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain localhost
  88. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain local
  89. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain invalid
  90. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain bind
  91. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: reading /tmp/resolv.dnsmasq
  92. Dec 31 18:00:15 DD-WRT authpriv.info dropbear[872]: Running in background
  93. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain test
  94. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain onion
  95. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain localhost
  96. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain local
  97. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain invalid
  98. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using only locally-known addresses for domain bind
  99. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using nameserver 1.1.1.1#53
  100. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using nameserver 10.8.0.1#53
  101. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: using nameserver 193.138.218.74#53
  102. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[870]: read /etc/hosts - 2 addresses
  103. Dec 31 18:00:15 DD-WRT daemon.warn openvpn[862]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
  104. Dec 31 18:00:15 DD-WRT daemon.warn openvpn[862]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
  105. Dec 31 18:00:15 DD-WRT daemon.notice openvpn[862]: Current Parameter Settings:
  106. Dec 31 18:00:15 DD-WRT daemon.notice openvpn[862]: config = '/tmp/openvpncl/openvpn.conf'
  107. Dec 31 18:00:15 DD-WRT daemon.notice openvpn[862]: mode = 0
  108. Dec 31 18:00:15 DD-WRT daemon.notice openvpn[862]: NOTE: --mute triggered...
  109. Dec 31 18:00:15 DD-WRT daemon.notice openvpn[862]: 227 variation(s) on previous 3 message(s) suppressed by --mute
  110. Dec 31 18:00:15 DD-WRT daemon.notice openvpn[862]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 5 2020
  111. Dec 31 18:00:15 DD-WRT daemon.notice openvpn[862]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.09
  112. Dec 31 18:00:15 DD-WRT daemon.notice openvpn[914]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
  113. Dec 31 18:00:15 DD-WRT daemon.warn openvpn[914]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  114. Dec 31 18:00:15 DD-WRT daemon.warn openvpn[914]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  115. Dec 31 18:00:16 DD-WRT user.info : dnsmasq : daemon successfully stopped
  116. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[870]: exiting on receipt of SIGTERM
  117. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: started, version 2.81 cachesize 1500
  118. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect no-inotify no-dumpfile
  119. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq-dhcp[1011]: DHCP, IP range 192.168.1.10 -- 192.168.1.59, lease time 1d
  120. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain test
  121. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain onion
  122. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain localhost
  123. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain local
  124. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain invalid
  125. Dec 31 18:00:16 DD-WRT user.info : dnsmasq : daemon successfully started
  126. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain bind
  127. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: reading /tmp/resolv.dnsmasq
  128. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain test
  129. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain onion
  130. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain localhost
  131. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain local
  132. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain invalid
  133. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using only locally-known addresses for domain bind
  134. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using nameserver 1.1.1.1#53
  135. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using nameserver 10.8.0.1#53
  136. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: using nameserver 193.138.218.74#53
  137. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1011]: read /etc/hosts - 2 addresses
  138. Dec 31 18:00:16 DD-WRT user.info : wland : daemon successfully stopped
  139. Dec 31 18:00:16 DD-WRT user.info : wland : daemon successfully started
  140. Dec 31 18:00:16 DD-WRT user.info : wan : WAN is up. IP: 192.168.1.2
  141. Dec 31 18:00:16 DD-WRT user.info : openvpn : OpenVPN daemon (Client) successfully stopped
  142. Dec 31 18:00:16 DD-WRT daemon.info httpd[1021]: httpd : httpd server started at port 80
  143. Dec 31 18:00:17 DD-WRT user.info : httpd : http daemon successfully started
  144. Dec 31 18:00:18 DD-WRT user.info : openvpn : OpenVPN daemon (Client) hanging, send SIGKILL
  145. Dec 31 18:00:18 DD-WRT user.info : openvpn : OpenVPN daemon (Client) starting/restarting...
  146. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1034]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
  147. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1034]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
  148. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1034]: Current Parameter Settings:
  149. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1034]: config = '/tmp/openvpncl/openvpn.conf'
  150. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1034]: mode = 0
  151. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1034]: NOTE: --mute triggered...
  152. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1034]: 227 variation(s) on previous 3 message(s) suppressed by --mute
  153. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1034]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 5 2020
  154. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1034]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.09
  155. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
  156. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1036]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  157. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1036]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  158. Dec 31 18:00:18 DD-WRT user.info : radvd : daemon successfully stopped
  159. Dec 31 18:00:18 DD-WRT daemon.warn radvd[853]: exiting, 1 sigterm(s) received
  160. Dec 31 18:00:18 DD-WRT daemon.info radvd[853]: sending stop adverts
  161. Dec 31 18:00:18 DD-WRT daemon.info radvd[853]: removing /var/run/radvd.pid
  162. Dec 31 18:00:18 DD-WRT daemon.info radvd[853]: returning from radvd main
  163. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1036]: Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  164. Dec 31 18:00:18 DD-WRT daemon.info radvd[1037]: version 2.18 started
  165. Dec 31 18:00:18 DD-WRT user.info : radvd : RADVD daemon successfully started
  166. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  167. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  168. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  169. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: TCP/UDP: Preserving recently used remote address: [AF_INET]174.127.113.3:1300
  170. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: Socket Buffers: R=[180224->180224] S=[180224->180224]
  171. Dec 31 18:00:19 DD-WRT daemon.warn openvpn[1036]: --mtu-disc is not supported on this OS
  172. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: UDP link local: (not bound)
  173. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: UDP link remote: [AF_INET]174.127.113.3:1300
  174. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: TLS: Initial packet from [AF_INET]174.127.113.3:1300, sid=26b6bdbd 4824b8b6
  175. Dec 31 18:00:19 DD-WRT daemon.warn openvpn[1036]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  176. Dec 31 18:00:19 DD-WRT daemon.err openvpn[1036]: VERIFY ERROR: depth=2, error=certificate is not yet valid: C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
  177. Dec 31 18:00:19 DD-WRT daemon.err openvpn[1036]: OpenSSL: error:1416F086:lib(20):func(367):reason(134)
  178. Dec 31 18:00:19 DD-WRT daemon.err openvpn[1036]: TLS_ERROR: BIO read tls_read_plaintext error
  179. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: NOTE: --mute triggered...
  180. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: 2 variation(s) on previous 3 message(s) suppressed by --mute
  181. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: TCP/UDP: Closing socket
  182. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: SIGUSR1[soft,tls-error] received, process restarting
  183. Dec 31 18:00:19 DD-WRT daemon.notice openvpn[1036]: Restart pause, 5 second(s)
  184. Dec 31 18:00:19 DD-WRT user.info : sfe : shortcut forwarding engine successfully stopped
  185. Dec 31 18:00:19 DD-WRT user.info : process_monitor : successfully started
  186. Dec 31 18:00:19 DD-WRT user.info : ttraff : traffic counter daemon successfully started
  187. Dec 31 18:00:19 DD-WRT daemon.debug ntpclient[1168]: Connecting to 2.pool.ntp.org [208.79.89.249] ...
  188. Jul 6 10:14:11 DD-WRT daemon.info ntpclient[1168]: Time set from 2.pool.ntp.org [208.79.89.249].
  189. Jul 6 10:14:11 DD-WRT daemon.info process_monitor[1167]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
  190. Jul 6 10:14:11 DD-WRT daemon.warn openvpn[1036]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  191. Jul 6 10:14:11 DD-WRT daemon.warn openvpn[1036]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  192. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: Re-using SSL/TLS context
  193. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  194. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  195. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  196. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  197. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: TCP/UDP: Preserving recently used remote address: [AF_INET]174.127.113.3:1300
  198. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: Socket Buffers: R=[180224->180224] S=[180224->180224]
  199. Jul 6 10:14:11 DD-WRT daemon.warn openvpn[1036]: --mtu-disc is not supported on this OS
  200. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: UDP link local: (not bound)
  201. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: UDP link remote: [AF_INET]174.127.113.3:1300
  202. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: TLS: Initial packet from [AF_INET]174.127.113.3:1300, sid=6368db27 eef93115
  203. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
  204. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v2, emailAddress=security@mullvad.net
  205. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: NOTE: --mute triggered...
  206. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: 2 variation(s) on previous 3 message(s) suppressed by --mute
  207. Jul 6 10:14:11 DD-WRT daemon.notice openvpn[1036]: [us-dal-101.mullvad.net] Peer Connection Initiated with [AF_INET]174.127.113.3:1300
  208. Jul 6 10:14:11 DD-WRT daemon.debug process_monitor[1167]: Restarting cron (time sync change)
  209. Jul 6 10:14:11 DD-WRT user.info : cron : daemon successfully stopped
  210. Jul 6 10:14:11 DD-WRT user.info : cron : daemon successfully started
  211. Jul 6 10:14:11 DD-WRT cron.info cron[1281]: (CRON) STARTUP (fork ok)
  212. Jul 6 10:14:11 DD-WRT user.info : process_monitor : daemon successfully stopped
  213. Jul 6 10:14:11 DD-WRT daemon.info process_monitor[1167]: process_monitor : cleanup timers
  214. Jul 6 10:14:12 DD-WRT daemon.notice openvpn[1036]: SENT CONTROL [us-dal-101.mullvad.net]: 'PUSH_REQUEST' (status=1)
  215. Jul 6 10:14:14 DD-WRT user.info : process_monitor : daemon hanging, send SIGKILL
  216. Jul 6 10:14:14 DD-WRT user.info : process_monitor : successfully started
  217. Jul 6 10:14:14 DD-WRT daemon.debug process_monitor[1283]: We need to re-update after 3600 seconds
  218. Jul 6 10:14:14 DD-WRT daemon.info process_monitor[1283]: process_monitor : set timer: 3600 seconds, callback: ntp_main()
  219. Jul 6 10:14:15 DD-WRT daemon.err httpd[1023]: httpd : Request Error Code 408: No request appeared within a reasonable time period.
  220. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: SENT CONTROL [us-dal-101.mullvad.net]: 'PUSH_REQUEST' (status=1)
  221. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.14.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.14.0.1,
  222. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: NOTE: --mute triggered...
  223. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: 2 variation(s) on previous 3 message(s) suppressed by --mute
  224. Jul 6 10:14:17 DD-WRT daemon.warn openvpn[1036]: NOTE: setsockopt TCP_NODELAY=1 failed
  225. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: OPTIONS IMPORT: --ifconfig/up options modified
  226. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: OPTIONS IMPORT: route options modified
  227. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: OPTIONS IMPORT: route-related options modified
  228. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: NOTE: --mute triggered...
  229. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: 4 variation(s) on previous 3 message(s) suppressed by --mute
  230. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: Data Channel: using negotiated cipher 'AES-256-GCM'
  231. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  232. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  233. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  234. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: GDG6: remote_host_ipv6=n/a
  235. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: TUN/TAP device tun1 opened
  236. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: TUN/TAP TX queue length set to 100
  237. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: do_ifconfig, tt->did_ifconfig_ipv6_setup=1
  238. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: /sbin/ifconfig tun1 10.14.0.7 netmask 255.255.0.0 mtu 1500 broadcast 10.14.255.255
  239. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: /sbin/ifconfig tun1 add fdda:d0d0:cafe:1300::1005/64
  240. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: /sbin/route add -net 174.127.113.3 netmask 255.255.255.255 gw 192.168.1.1
  241. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
  242. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
  243. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: add_route_ipv6(::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  244. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: /sbin/route -A inet6 add ::/2 dev tun1
  245. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  246. Jul 6 10:14:17 DD-WRT daemon.notice openvpn[1036]: /sbin/route -A inet6 add 4000::/2 dev tun1
  247. Jul 6 10:14:18 DD-WRT daemon.notice openvpn[1036]: add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  248. Jul 6 10:14:18 DD-WRT daemon.notice openvpn[1036]: /sbin/route -A inet6 add 8000::/2 dev tun1
  249. Jul 6 10:14:18 DD-WRT daemon.notice openvpn[1036]: add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  250. Jul 6 10:14:18 DD-WRT daemon.notice openvpn[1036]: /sbin/route -A inet6 add c000::/2 dev tun1
  251. Jul 6 10:14:18 DD-WRT user.info : nas : wait for network init
  252. Jul 6 10:14:18 DD-WRT daemon.notice openvpn[1036]: Initialization Sequence Completed
  253. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  254. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: CMD 'state'
  255. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client disconnected
  256. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  257. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: CMD 'state'
  258. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client disconnected
  259. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  260. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: CMD 'state'
  261. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client disconnected
  262. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  263. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: CMD 'status 2'
  264. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client disconnected
  265. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  266. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: CMD 'log 500'
  267. Jul 6 10:14:19 DD-WRT daemon.notice openvpn[1036]: MANAGEMENT: Client disconnected
  268. Jul 6 10:14:26 DD-WRT user.debug : ttraff: data collection started
  269. Jul 6 10:14:28 DD-WRT user.info : nas : start nas lan
  270. Jul 6 10:14:28 DD-WRT user.info : nas : start nas for wl0
  271. Jul 6 10:14:28 DD-WRT user.info : nas : start nas lan
  272. Jul 6 10:14:28 DD-WRT user.info : nas : start nas for wl1
  273. Jul 6 10:14:29 DD-WRT user.info : nas : start nas lan
  274. Jul 6 10:14:29 DD-WRT user.info : nas : start nas for wl0
  275. Jul 6 10:14:29 DD-WRT user.info : nas : start nas lan
  276. Jul 6 10:14:29 DD-WRT user.info : nas : start nas for wl1
  277. Jul 6 10:14:29 DD-WRT user.info : httpd : daemon successfully stopped
  278. Jul 6 10:14:29 DD-WRT daemon.info httpd[1023]: httpd : httpd server shutdown
  279. Jul 6 10:14:29 DD-WRT daemon.info httpd[1412]: httpd : httpd server started at port 80
  280. Jul 6 10:14:29 DD-WRT user.info : httpd : http daemon successfully started
  281. Jul 6 10:14:29 DD-WRT user.info : resetbutton : daemon successfully stopped
  282. Jul 6 10:14:29 DD-WRT user.info : resetbutton : resetbutton daemon successfully started
  283.  
  284. OPENVPN Log:
  285.  
  286. Client: CONNECTED SUCCESS Local Address: 10.14.0.7
  287. Remote Address: 10.14.0.7
  288.  
  289. Status
  290. VPN Client Stats
  291. TUN/TAP read bytes 152
  292. TUN/TAP write bytes 0
  293. TCP/UDP read bytes 5473
  294. TCP/UDP write bytes 1254
  295. Auth read bytes 80
  296. pre-compress bytes 0
  297. post-compress bytes 0
  298. pre-decompress bytes 0
  299. post-decompress bytes 0
  300.  
  301. Log
  302. Clientlog:
  303. 19691231 18:00:18 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  304. 19691231 18:00:18 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  305. 19691231 18:00:19 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  306. 19691231 18:00:19 Local Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-client'
  307. 19691231 18:00:19 Expected Remote Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-server'
  308. 19691231 18:00:19 I TCP/UDP: Preserving recently used remote address: [AF_INET]174.127.113.3:1300
  309. 19691231 18:00:19 Socket Buffers: R=[180224->180224] S=[180224->180224]
  310. 19691231 18:00:19 W --mtu-disc is not supported on this OS
  311. 19691231 18:00:19 I UDP link local: (not bound)
  312. 19691231 18:00:19 I UDP link remote: [AF_INET]174.127.113.3:1300
  313. 19691231 18:00:19 TLS: Initial packet from [AF_INET]174.127.113.3:1300 sid=26b6bdbd 4824b8b6
  314. 19691231 18:00:19 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  315. 19691231 18:00:19 N VERIFY ERROR: depth=2 error=certificate is not yet valid: C=SE ST=Gotaland L=Gothenburg O=Amagicom AB OU=Mullvad CN=Mullvad Root CA v2 emailAddress=security@mullvad.net
  316. 19691231 18:00:19 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
  317. 19691231 18:00:19 N TLS_ERROR: BIO read tls_read_plaintext error
  318. 19691231 18:00:19 NOTE: --mute triggered...
  319. 19691231 18:00:19 2 variation(s) on previous 3 message(s) suppressed by --mute
  320. 19691231 18:00:19 TCP/UDP: Closing socket
  321. 19691231 18:00:19 I SIGUSR1[soft tls-error] received process restarting
  322. 19691231 18:00:19 Restart pause 5 second(s)
  323. 20200706 10:14:11 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  324. 20200706 10:14:11 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  325. 20200706 10:14:11 Re-using SSL/TLS context
  326. 20200706 10:14:11 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  327. 20200706 10:14:11 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  328. 20200706 10:14:11 Local Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-client'
  329. 20200706 10:14:11 Expected Remote Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-server'
  330. 20200706 10:14:11 I TCP/UDP: Preserving recently used remote address: [AF_INET]174.127.113.3:1300
  331. 20200706 10:14:11 Socket Buffers: R=[180224->180224] S=[180224->180224]
  332. 20200706 10:14:11 W --mtu-disc is not supported on this OS
  333. 20200706 10:14:11 I UDP link local: (not bound)
  334. 20200706 10:14:11 I UDP link remote: [AF_INET]174.127.113.3:1300
  335. 20200706 10:14:11 TLS: Initial packet from [AF_INET]174.127.113.3:1300 sid=6368db27 eef93115
  336. 20200706 10:14:11 VERIFY OK: depth=2 C=SE ST=Gotaland L=Gothenburg O=Amagicom AB OU=Mullvad CN=Mullvad Root CA v2 emailAddress=security@mullvad.net
  337. 20200706 10:14:11 VERIFY OK: depth=1 C=SE ST=Gotaland O=Amagicom AB OU=Mullvad CN=Mullvad Intermediate CA v2 emailAddress=security@mullvad.net
  338. 20200706 10:14:11 NOTE: --mute triggered...
  339. 20200706 10:14:11 2 variation(s) on previous 3 message(s) suppressed by --mute
  340. 20200706 10:14:11 I [us-dal-101.mullvad.net] Peer Connection Initiated with [AF_INET]174.127.113.3:1300
  341. 20200706 10:14:12 SENT CONTROL [us-dal-101.mullvad.net]: 'PUSH_REQUEST' (status=1)
  342. 20200706 10:14:17 SENT CONTROL [us-dal-101.mullvad.net]: 'PUSH_REQUEST' (status=1)
  343. 20200706 10:14:17 PUSH: Received control message: 'PUSH_REPLY dhcp-option DNS 10.14.0.1 redirect-gateway def1 bypass-dhcp route-ipv6 0000::/2 route-ipv6 4000::/2 route-ipv6 8000::/2 route-ipv6 C000::/2 comp-lzo no route-gateway 10.14.0.1 topology subnet socket-flags TCP_NODELAY ifconfig-ipv6 fdda:d0d0:cafe:1300::1005/64 fdda:d0d0:cafe:1300:: ifconfig 10.14.0.7 255.255.0.0 peer-id 7 cipher AES-256-GCM'
  344. 20200706 10:14:17 NOTE: --mute triggered...
  345. 20200706 10:14:17 2 variation(s) on previous 3 message(s) suppressed by --mute
  346. 20200706 10:14:17 W NOTE: setsockopt TCP_NODELAY=1 failed
  347. 20200706 10:14:17 OPTIONS IMPORT: --ifconfig/up options modified
  348. 20200706 10:14:17 OPTIONS IMPORT: route options modified
  349. 20200706 10:14:17 OPTIONS IMPORT: route-related options modified
  350. 20200706 10:14:17 NOTE: --mute triggered...
  351. 20200706 10:14:17 4 variation(s) on previous 3 message(s) suppressed by --mute
  352. 20200706 10:14:17 Data Channel: using negotiated cipher 'AES-256-GCM'
  353. 20200706 10:14:17 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  354. 20200706 10:14:17 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  355. 20200706 10:14:17 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  356. 20200706 10:14:17 GDG6: remote_host_ipv6=n/a
  357. 20200706 10:14:17 I TUN/TAP device tun1 opened
  358. 20200706 10:14:17 TUN/TAP TX queue length set to 100
  359. 20200706 10:14:17 do_ifconfig tt->did_ifconfig_ipv6_setup=1
  360. 20200706 10:14:17 I /sbin/ifconfig tun1 10.14.0.7 netmask 255.255.0.0 mtu 1500 broadcast 10.14.255.255
  361. 20200706 10:14:17 I /sbin/ifconfig tun1 add fdda:d0d0:cafe:1300::1005/64
  362. 20200706 10:14:17 /sbin/route add -net 174.127.113.3 netmask 255.255.255.255 gw 192.168.1.1
  363. 20200706 10:14:17 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
  364. 20200706 10:14:17 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
  365. 20200706 10:14:17 I add_route_ipv6(::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  366. 20200706 10:14:17 /sbin/route -A inet6 add ::/2 dev tun1
  367. 20200706 10:14:17 I add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  368. 20200706 10:14:17 /sbin/route -A inet6 add 4000::/2 dev tun1
  369. 20200706 10:14:17 I add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  370. 20200706 10:14:18 /sbin/route -A inet6 add 8000::/2 dev tun1
  371. 20200706 10:14:18 I add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  372. 20200706 10:14:18 /sbin/route -A inet6 add c000::/2 dev tun1
  373. 20200706 10:14:18 I Initialization Sequence Completed
  374. 20200706 10:14:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  375. 20200706 10:14:19 D MANAGEMENT: CMD 'state'
  376. 20200706 10:14:19 MANAGEMENT: Client disconnected
  377. 20200706 10:14:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  378. 20200706 10:14:19 D MANAGEMENT: CMD 'state'
  379. 20200706 10:14:19 MANAGEMENT: Client disconnected
  380. 20200706 10:14:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  381. 20200706 10:14:19 D MANAGEMENT: CMD 'state'
  382. 20200706 10:14:19 MANAGEMENT: Client disconnected
  383. 20200706 10:14:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  384. 20200706 10:14:19 D MANAGEMENT: CMD 'status 2'
  385. 20200706 10:14:19 MANAGEMENT: Client disconnected
  386. 20200706 10:14:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  387. 20200706 10:14:19 D MANAGEMENT: CMD 'log 500'
  388. 20200706 10:14:19 MANAGEMENT: Client disconnected
  389. 20200706 10:16:54 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  390. 20200706 10:16:54 D MANAGEMENT: CMD 'state'
  391. 20200706 10:16:54 MANAGEMENT: Client disconnected
  392. 20200706 10:16:54 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  393. 20200706 10:16:54 D MANAGEMENT: CMD 'state'
  394. 20200706 10:16:54 MANAGEMENT: Client disconnected
  395. 20200706 10:16:54 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  396. 20200706 10:16:54 D MANAGEMENT: CMD 'state'
  397. 20200706 10:16:54 MANAGEMENT: Client disconnected
  398. 20200706 10:16:54 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  399. 20200706 10:16:54 D MANAGEMENT: CMD 'status 2'
  400. 20200706 10:16:54 MANAGEMENT: Client disconnected
  401. 20200706 10:16:54 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  402. 20200706 10:16:54 D MANAGEMENT: CMD 'log 500'
  403. 19691231 18:00:00
Add Comment
Please, Sign In to add comment